-
Updated
Dec 4, 2020 - Python
pentest
Here are 253 public repositories matching this topic...
-
Updated
Nov 29, 2020 - Python
-
Updated
Sep 5, 2020 - Python
-
Updated
Nov 23, 2020 - Python
-
Updated
Oct 6, 2020 - Python
-
Updated
Oct 30, 2020 - Python
-
Updated
Jan 2, 2020 - Python
-
Updated
Nov 3, 2018 - Python
-
Updated
Nov 24, 2020 - Python
-
Updated
Feb 21, 2019 - Python
-
Updated
Oct 30, 2020 - Python
-
Updated
Jun 12, 2020 - Python
-
Updated
Dec 4, 2020 - Python
-
Updated
Dec 4, 2020 - Python
-
Updated
Jun 22, 2020 - Python
-
Updated
May 27, 2020 - Python
-
Updated
Jul 23, 2020 - Python
-
Updated
Dec 25, 2019 - Python
-
Updated
Dec 1, 2020 - Python
-
Updated
Mar 25, 2020 - Python
-
Updated
May 9, 2020 - Python
-
Updated
Apr 20, 2018 - Python
Currently, if an intercepted client disconnects while their session is hijacked, PyRDP will ignore the request for disconnect until the RDP client times out, after which point both connections (client - pyrdp and pyrdp - server) are disconnected. Dropping the hijacked session in the process.
It would be nice and not too complicated to disconnect the client smoothly while keeping the hijacked se
Improve this page
Add a description, image, and links to the pentest topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentest topic, visit your repo's landing page and select "manage topics."
I have been using this tool for awhile and i noticed 50% of the results are false positive. for i,e after cloudflair dump a list of ip addresses for the site origin server it can't detect which one is working so i after i take those ip addresses i test them manually on the both ports 443 & 80 some they work on 443 port and some they only work at 80 port.
Thank you so much for this amazing tool